Certified Cyber Crime Consultants Are Experts In:

  • Hacked Network

    As A Certified Cyber Crime Consultant, You Will Learn How To Investigate Computers, Websites And Networks That Have Been Hacked.

  • Cyber Extortion & Blackmail

    Learn How Consumers, Business People, Entertainers, Athletes, Public Figures Are Being Blackmailed Or Extorted.

  • How To Consultant

    How To Consultant With Other IT Managers, Law Enforcement, CEO's, Small Business Owners, Athletes, Entertainers and Other Organizations.

  • Social Media Investigations

    Learn Different Techniques You Can Use To Locate A Person, Find Their Locations, Track Their Activities, Locate Their Friends And Family, Plus A Lot More.

  • Identity Theft

    Learn How Individuals As Well As Companies Have Their Identities Stolen. Then Learn What The Bad Guys Do Once They Have The Identities.

  • Scams

    Learn About The Different Scams And Schemes Crooks Use To Steal Information. This Includes Email Scams, Telephone Scams And More.

  • According to the Verizon Data Breach Investigation Report: 61% of breaches occurred in smaller businesses last year.
  • According to UPS Capital: Breaches cost small businesses between $84,000 and $148,000 33% of firms required 3+ days to recover.
  • According to the FBI, 84% of computer attacks are inside jobs.

Checklist

This course is taught as a self-paced online course and in a classroom setting.

  • Instruction by an expert facilitator

  • Online assistance

  • Specialized online manual and course materials

  • Personalized certificate as a Certified Cyber Crime Consultant

Course Objectives

  • Effectively protect websites from being hacked. 
  • Demonstrate an understanding of professional, ethical and legal issues as it relates to cyber crime. 
  • Effectively investigate cyber extortion and cyber blackmail cases. 
  • Articulate oral and written skills necessary to develop company security policies. 
  • Effectively assess employee risks. 
  • Demonstrate an ability to perform penetration tests. 
  • Demonstrate an understanding of how internet scams are committed and how to investigate them. 
  • Demonstrate an ability to assess any business, or government agency on their physical and network vulnerabilities. 
  • Utilize techniques to effectively profile a cyber criminal. 
  • Demonstrate an ability to perform basic cell phone and tablet computer forensics. 
  • Understand how to teach parents about Online Child Safety.
  • Social Media investigation.
  • How to install and remove malware and viruses.
  • How to consult with entertainers, athletes, celebrities, small businesses, corporations and governments agencies.
  • How to start your own cyber security company.
  • How to market your skill sets.
  • How to build your own "Hacker For Hire" service legally. 
  • How to remove links from Google.

All Students Will Receive A Certificate Of Completion

All Students will receive a certificate of completion as a

Certified Cyber Crime Consultant.

Course Curriculum

    1. Support

    2. About This Course

    3. Download Security And Acronyms Definitions

    4. What Every Cyber Security Consultant Should Have

    5. 100 Hacking Tools and Resources

    1. About This Course

    2. What About The Geek Squad?

    3. IT Manager, Computer Security Expert Or Hacker

    4. Having A Career In IT And/Or Cyber Security

    5. Basic Computer Problem

    6. Jack Of All Trades

    7. Don't Be Shy

    8. Become A Teacher

    9. Speak Less

    10. The Basic Networking

    11. Can You Trace A Network

    12. Latency And Bandwidth

    13. Do You Understand Script Writing

    14. Backups Then Backup Again

    15. Storing Your Password

    16. Hard Work

    17. Become A Project Manager

    18. Understanding The Business Side

    19. Don't Be Afraid To Debate

    20. Always Have A Solutions

    21. Ask Questions

    22. Book Smart Vs. Street Smart

    1. About This Chapter

    2. Understanding Your Role As A Certified Cyber Crime Consultant

    3. Ethics In Cyber/Computer Security

    4. 10 Leadership Qualities

    5. Agent of the Government

    6. Ethics And Leadership Quiz

    1. About This Chapter

    2. 12 Things Every Leader Should Do To Prevent Cyber Attacks

    1. Overview Of Cyber Insurance

    2. Proof That Hacking Is Bigger Than All Drug Trafficking In The World!

    3. What Does Cyber Insurance Cover?

    4. Ten Things You Need To Know About Cyber Security Insurance

    5. The Different Types Of Cyber Insurance

    6. What Is Covered by Third-Party Cyber Insurance?

    7. What Is Covered By First-Party Cyber Insurance?

    8. What Is Not Covered By Cyber Insurance?

    9. Determining Your Cyber Insurance Coverage Needs

    10. Cyber Insurance Checklist

    1. What Is A CIO?

    2. What Is A CTO?

    3. What Is A CISO?

    4. What Is A IT Manager?

    5. How to Assess an IT Department

    6. Layering For Security

    7. DMZ

    8. VLAN's

    9. NAT

    10. Rogue IT Manager

    11. Disabling The Windows Command Prompt

    12. How to Disable USB Ports On Windows Machines

    13. How to Disable USB Ports - Mac OS

    14. The Difference Between A Server And A PC

    15. Disabling The Windows Command Prompt

    16. Securing Corporate Sensitive Data

    17. Completely Erasing Data From A Disk

    18. What Is a Proxy Server

    19. Hiding Data Using Steganography

    20. Steganography

    21. Quiz

    22. Network Topology Discovery Using Software Tools

    23. Setting Up Remote Access Authentication

    24. Additional Switch Hardening Techniques

    25. Implementing A Secure Network Design

    26. Secure Network Architecture Concepts

    27. Additional Switch Hardening Techniques

    28. Host Health Checks

    29. Implementing A Secure Network Design

About this course

  • 4 x $200.00
  • 472 lessons
  • 17.5 hours of video content

Learn How To Become A Spy

Learn how to install surveillance software (spyware) on your clients computers, to find employees who maybe stealing company intellectual property.

Learn Counter Surveillance

As Certified Cyber Crime Counsultant, you will learn counter surveillance which includes sweeping homes, offices and cars.

Included In This Course

USB RUBBER DUCKY

Imagine you could walk up to a computer, plug in a seemingly innocent USB drive, and have it install a backdoor, exfiltrate documents, steal passwords or any number of pentest tasks.

GET ONE OF THE FOLLOWING SHIRTS UPON COMPLETIONS

Once you complete this course, you will receive a free Certified Cyber Crime Consultant Shirt. 

Pricing options

Download The National Cyber Security University App For Discount Codes.